Bug 562075
| Summary: | kernel: vfs: add MNT_NOFOLLOW flag to umount(2) [mrg-1] | ||
|---|---|---|---|
| Product: | Red Hat Enterprise MRG | Reporter: | Eugene Teo (Security Response) <eteo> |
| Component: | realtime-kernel | Assignee: | Luis Claudio R. Goncalves <lgoncalv> |
| Status: | CLOSED ERRATA | QA Contact: | David Sommerseth <davids> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | Development | CC: | bhu, lgoncalv, ovasik, williams |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: |
Added the MNT_NOFOLLOW option to the umount(2) system call. This prevents umount(2) from following symlinks and avoids symlink attacks on unprivileged umounts on filesystems such as fuse, samba and ncpfs.
|
Story Points: | --- |
| Clone Of: | 562072 | Environment: | |
| Last Closed: | 2010-08-17 15:53:36 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 562072, 562078, 673177 | ||
| Bug Blocks: | |||
|
Description
Eugene Teo (Security Response)
2010-02-05 07:39:44 UTC
Upstream commit: http://git.kernel.org/linus/db1f05bb85d7966b9176e293f3ceead1cb8b5d79 Patch bz562075-vfs-add-MNT_NOFOLLOW-flag-to-umount.patch, backport of upstream commit db1f05bb85d7966b9176e293f3ceead1cb8b5d79, has been added to kernel -159 patch queue. Technical note added. If any revisions are required, please edit the "Technical Notes" field accordingly. All revisions will be proofread by the Engineering Content Services team. New Contents: Added the MNT_NOFOLLOW option to the umount(2) system call. This prevents umount(2) from following symlinks and avoids symlink attacks on unprivileged umounts on filesystems such as fuse, samba and ncpfs. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2010-0631.html |